Hi [[ session.user.profile.firstName ]]

Virtualization

  • Podcast - Scale-out NAS vs. Distributed Storage Podcast - Scale-out NAS vs. Distributed Storage Charlie Hodges, Storage Switzerland Recorded: Feb 20 2017 13 mins
    They seem to solve the same problem – meeting the constantly growing performance and capacity demands of the enterprise. But Scale-out NAS and Distributed Storage are different. Join our next LIVE podcast to learn what Scale-out NAS and Distributed Storage are, how they are different and which one is right for you. Attendees to the live podcast will be able to ask questions and get answers in real-time. NO REGISTRATION REQUIRED!
  • Disaster Recovery as-a-Service, the Killer App in the Cloud! Disaster Recovery as-a-Service, the Killer App in the Cloud! Swen Conrad, ocean9 | David Torres, SUSE Recorded: Feb 16 2017 58 mins
    A group of researchers from the University of Massachusetts Amherst and AT&T Labs stated: “… [that] running DR services using public cloud shown[ed] cost reductions of up to 85% … .”

    Join this webinar by SUSE and Ocean9 to understand how to leverage public cloud like Amazon Web Services or Microsoft Azure for delivering Disaster Recovery as-a-Service (DRaaS) and achieving such infrastructure cost savings. We will cover both DRaaS concepts as well as show an actual cloud service implementation for a demanding enterprise class workload with SAP HANA.

    8 years after this quote was published by the team of researchers, now it is prime time to leverage leading public cloud capabilities in the enterprise.
  • Shift-Left Security: How to Automate Security into Your Pipeline Shift-Left Security: How to Automate Security into Your Pipeline Benjy Portnoy, Aqua Security Recorded: Feb 16 2017 37 mins
    As DevOps role in the IT management is growing and virtual containers are rapidly gaining popularity – Docker is the fastest growing DevOps tool – DevOps now need to deal with security issues as well, and rethink their overall security strategy. How can they maintain an enterprise-grade security? Join our webinar to learn:
    •How to manage vulnerabilities in container images at DevOps speed?
    •How to fully automate security tests and bake them into your pipeline?
    •How to satisfy IT security and compliance requirements with minimal effort?
  • A Deep Dive into StorNext 5.4 (APAC) A Deep Dive into StorNext 5.4 (APAC) Dave Frederick, Sr. Director of Product Marketing - Quantum and Nick Elvester, Sr. Product Manager Recorded: Feb 16 2017 28 mins
    Quantum's StorNext 5.4 brings new levels of performance, efficiency, flexibility and compatibility to media storage and data management. Enhancements include more tiering options, support for integrated applications, and even faster network connectivity.
  • IDC MarketScape 2016 Vendor Assessment – Virtual Client Computing Software IDC MarketScape 2016 Vendor Assessment – Virtual Client Computing Software Dave Grant – VP Product Marketing, EUC, VMWare and Rob Young – Research Manager, ITSM & Client Virtualization, IDC Recorded: Feb 15 2017 43 mins
    Today, enterprises need to consider more than a company’s current needs; they must also look ahead toward how to best accomplish digital transformation. And client virtualization technology plays a key role in such progression of managing applications and desktops.

    Discover how a variety of vendors compare and the reasons why IDC named VMware a Leader in the IDC MarketScape for Virtual Client Computing Software for the second straight year – with VMware leading the scoring in both strategy and capability.

    Join us and learn:
    - Which vendors are well aligned when it comes to customer needs
    - Which vendors offer the best client computing solutions with a commitment to long-term end-user computing innovation?
    - Which vendors provide comprehensive and mature solutions for specific industries
    - Which vendors have the commitment to providing resources and continued expansion of the EUC infrastructure

    And more about what key factors differentiate the VMware EUC product portfolio from the competition.
  • TriHealth's Road to All Flash Storage and Epic EHR Virtualization TriHealth's Road to All Flash Storage and Epic EHR Virtualization Doug Robertson, Manager of Data Center Solutions, TriHealth; Vik Nagjee, CTO, Pure Storage Recorded: Feb 15 2017 60 mins
    The reality in healthcare IT today is that we are fighting a day-to-day battle to keep up with demands for new apps, analytics, performance and mobility.

    This webinar features Doug Robertson, Manager of Data Center Solutions for TriHealth, a five-hospital health system headquartered in Cincinnati, OH. Doug will tell his story of data center transformation in just two years with all-flash storage solutions and virtualization of the health system’s Epic EHR environment.

    Attendees will gain understanding of the growing importance of all-flash storage is a critical element to support simplification of the datacenter environment, even amidst the complexity added by virtualization, analytics, productivity and resiliency requirements.
  • Build an Agile and Elastic Big Data Pipeline Build an Agile and Elastic Big Data Pipeline Deba Chatterjee Director of Products, Robin Systems Recorded: Feb 15 2017 55 mins
    To stay competitive in today's global economy, organizations need to harness data from multiple sources, extract information and then make real-time decisions. Depending on the industry and the organization, Big Data encompasses information from multiple internal and external sources. Capturing, integrating and preparing this data for downstream analysis is often time-consuming and presents a big challenge. Today, organizations are struggling to cobble together different open source software to build an effective data pipeline that can withstand the volume as well as the speed of data ingestion and analysis. Robin relieves customers from the pains of building and maintaining a data pipeline and helps enterprises to make the most of Big Data.

    In this webinar, we will focus on how Robin’s containerization platform can be used to:

    - Build an agile and elastic data pipeline
    - Deploy, scale, and manage the most complex big data applications with just a single click of a button
    - Deal with variety, velocity, and volume of enterprise Big Data
  • StorageSwiss Podcast: Analysis, Briefings, Google vs. Amazon Cloud Storage StorageSwiss Podcast: Analysis, Briefings, Google vs. Amazon Cloud Storage Charlie Hodges, Storage Switzerland Recorded: Feb 15 2017 46 mins
    Join us for our next live podcast. We will provide analysis on the latest news like:
    * Carbonite buying DoubleTake
    * Violin Memory being bought at auction
    * StorageCraft buying Exablox
    * Datto buying OpenMesh

    Will also review our recent briefings including:
    * Talon
    * Vembu
    * Actifio
    * Zoolz
    * Bluelock
    * HubStor

    In this episode’s deep dive our analyst team will discuss the pros and cons of Amazon and Google cloud storage. NO REGISTRATION REQUIRED!
  • Introduction to SQL Server on SUSE Linux Enterprise Server Introduction to SQL Server on SUSE Linux Enterprise Server Travis Wright, Eamonn Colman, David Rocha, Jeff Lindholm Recorded: Feb 15 2017 58 mins
    The next version of Microsoft SQL Server is coming to Linux and is already in preview. In this session, Travis Wright, Principal Program Manager from Microsoft, will provide an introduction to SQL Server and how it runs on SUSE Linux Enterprise Server and container platforms. The scope of the first release on Linux and schedule will be covered and deployment, configuration, high availability, storage, and performance/scale will be topics for a more technical drill in.
  • Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Mobile SDK Trends & Implications: Delivering Quality Mobile Apps with HPE Mobile Ronnie Sternberg, SafeDK, Kimm Yeo, HPE Recorded: Feb 15 2017 57 mins
    The use of Software Development Kits (SDKs) continues to be on the rise in mobile apps. In the last six months, we’ve seen a jump of more than 12% in the use of SDKs for creating mobile apps. These off-the-shelf services, from advertising, analytics, social, and more, are helpful in the mobile development process. They offer unique functionality and simplify the coding, while saving time and money. But SDKs are not really YOUR code. You work hard to ensure your users’ experience, safety and privacy in your own code, but can you guarantee the same for the code from these guest SDKs? What about the test implications and impact on user engagement and retention?

    Join us to hear about:
    Key trends and findings for Mobile SDKs
    2 major domains of risk introduced when using SDKs and associated real-life stories
    How you can achieve a 5 star rating using HPE Mobile Center and SafeDK
  • LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet LPWAN - How LPWAN networks int for Smart Communities and the Industrial Internet Yann Gabay - CONNIT; Brian Ray - Link Labs, Tiana McNeil - Ingenu, Jeff Siegel - nwave, Limor Schafman - TIA Recorded: Feb 15 2017 62 mins
    LPWAN (low power wide area network) technologies service a specific and necessary role in the growth of Internet of Things (IoT) connectivity. Not all applications need bandwidth and speed. Sometimes long distance, low energy usage, and long latency is the perfect confluence of service that an IoT application needs. Some examples are city lighting, energy grid and meter management, parking space monitoring, precision irrigation, crop yield management, and many more.

    This webcast will present different LPWAN technologies and discuss a number of questions regarding technology and value assessment, deployment, usage of such networks, and return on investment evaluations.

    - An explanation of LPWAN technology and how it works
    - When to use (and not use) LPWAN technology
    - What issues such networks solve
    - The difference between U.S. and European bands and when this will matter to a company deploying an LPWAN network
    - Key information that cities and companies need to both ask and be ready to answer when planning to deploy an LPWAN network, in order to assess the right fit and to maximize efficiencies such connectivity can bring
    - How LPWAN networks integrate with other network infrastructure in smart community deployments, for example
    - Sample use cases
    - Business models that use LPWAN networks for energy management, asset management, and others
    - How to make money as both a user and deployer of LPWAN networks
    - What returns on investment can be expected and suggested metrics for measurement

    Speakers:
    Yann Gabay, Co-founder and Board Member, CONNIT
    Tiana McNeil, Sr. Business Development Manager, Iot Smart Cities, Ingenu
    Brian Ray, CTO and Founder, Link Labs
    Jeffrey Siegel, CMO, nwave

    This webcast is NOT BICSI accredited.
  • SUSE Container as a Service Platform – An Introduction SUSE Container as a Service Platform – An Introduction Raj Meel & Simona Arsene Recorded: Feb 15 2017 62 mins
    Modern IT demands more out of containers. SUSE is creating an easy to use platform solution that helps you deliver container as a service with ease. This session will focus on MicroOS – one of the key technologies involved in creating the solution.
  • Unlocking Innovation with Next Generation Cloud Infrastructure Unlocking Innovation with Next Generation Cloud Infrastructure Jose Simonelli, Architect Services Manager, Red Hat Recorded: Feb 14 2017 39 mins
    Companies are looking to the promise of next-generation and cloud infrastructures to drive innovation within their organization. This places ever growing and changing demands on their IT organizations to be more responsive, agile, cost sensitive, and transparent.

    Though the destination may seem obvious, most companies are unsure of how to get there. Transitioning workloads from legacy or traditional infrastructures to these new robust, flexible cloud infrastructures requires precise planning and execution. It’s more than just moving virtual machines.

    In this session, we’ll discuss the proven approach Red Hat has used to support customers in deploying and migrating to these cloud infrastructures. It not only tackles the technical aspects of the migration but also addresses how we support IT organizations in meeting the new demands being placed on them.

    You’ll learn how to:
    - Radically simplify the orchestration of workload migrations while preserving VM relationships and application ordering.
    - Standardize and automate provisioning for greater agility and quicker time-to-market for new development.
    - Reduce vendor dependency while continuing to use existing infrastructure investments.
    - Reduce operational costs and complexity while increasing responsiveness.
    - Enable teams to manage change.
  • Make API Driven Testing the Object of Your Affection this Valentine Day Make API Driven Testing the Object of Your Affection this Valentine Day Nathan Devoll, CA Technologies Recorded: Feb 14 2017 56 mins
    For organizations with legacy and/or proprietary applications one of the biggest challenges to automating more tests can be the failure of test automation tools to recognize objects. In addition to identifying objects finding a tool that can automate testing across all the different protocols of these applications can also be a major challenge.

    During this webcast we’ll share with you two stories shared at CA World from GM and Williams Energy on how they were able to accelerate testing by shifting to an API strategy. During the session we’ll cover how CA’s DevTest solution help clients:

    •Shift testing from the UI to the API
    •Decrease maintenance efforts and run times for regression tests
    •Use a single tool to automate testing across the full stack
    •Incorporate testing into continuous integration efforts

    In addition to talking about GM and Williams energy we’ll also share additional real world stories on how others have adopted DevTest to delight their management teams and increase speed to market.
  • What’s Next In Securing Identities? Key Identity & Access Management Trends What’s Next In Securing Identities? Key Identity & Access Management Trends Danna Bethlehem - Director, Product Marketing, Identity Protection Recorded: Feb 13 2017 43 mins
    Over the past year, we have seen data breaches shift towards identity-based breaches, targeting personal information of either employees or consumers. The access to the information is used to craft and construct highly organized attacks on enterprises and is a growing contributor to identity theft. The problem is compounded by the convergence of personal and work place identities, ultimately creating major security challenges for companies.

    Our 2016 Authentication and Access Management survey found 90% of enterprise IT professionals are concerned that employee reuse of personal credentials for work purposes could compromise security. During the webinar, we’ll be discussing this and other trends in the strong authentication and access management market, including:

    - The status of the two-factor authentication market and what we can expect in the years to come
    - The enterprise risk issues of using social media credentials to access to corporate resources
    - The role the cloud is playing in the enterprise especially as it relates to single sign on and application management and access
    - The ongoing challenges enterprises cite as barriers to mass adoption of a mobile workforce
  • The Unique Challenges of Protecting Cloud Assets The Unique Challenges of Protecting Cloud Assets Chris S. Smith, Product Marketing – Cloud and MSP, CyberArk Software, Adrian Davis, Managing Director, (ISC)² EMEA Recorded: Feb 10 2017 62 mins
    This session is targeted at IT and security leaders and is designed to help them understand and address the unique challenges that enterprises typically face when they deploy their applications in the public cloud. It summarize the areas that the public cloud vendors typically take care of and highlights the areas that the enterprise and application owners are typically responsible for. With a focus on managing privileged accounts in the cloud environment the session addresses challenges and solutions for securing application to application sharing and communications, elastic, hybrid and DevOps environments. While the focus is on public cloud many of the best practices and learnings will also be applicable to private cloud environments.
  • Getting More Out of vSAN: vSAN Architecture & What’s New in 6.5 Getting More Out of vSAN: vSAN Architecture & What’s New in 6.5 Jeff Hunter, Staff Technical Marketing Architect at VMware & Vijay Ramachandran, Senior Director of Product Management Recorded: Feb 10 2017 61 mins
    This session will give you a thorough overview of vSAN’s architecture, commonly used terms, and the benefits of its unique in-kernel design. Next, we will discuss vSAN 2-node and stretched cluster configurations and use cases. The webcast will conclude with insight into the new features of vSAN 6.5 including 2-node direct-connect, automation with PowerCLI, and iSCSI access for physical servers.
  • The Rules of RAID are Changing The Rules of RAID are Changing John Nicholson, Ron Scott Adams, Marcus Pucket Recorded: Feb 10 2017 63 mins
    The Rules of RAID are Changing, co-hosted by VMware and Spiceworks

    Back in the day, rules were create for storage admins to make deciding on RAID levels easy. RAID 10 for performance. RAID 6 for bulk capacity. RAID 5 for… well… we’re not sure.

    But thanks to advances in storage technology like flash SSDs and virtual SANs, the rules of RAID are changing. Tune into this week’s On the Air, where we’ll talk about WHY these changes are meaningful and where we need to go with RAID from here. We’ll be sitting down with an IT pro from the Spiceworks Community as well as an expert from VMware.

    What we're discussing:
    How the original rules of RAID came to be... and why they may no longer apply

    How using flash can change the way you need to think about redundancy (and yes, it's affordable now)

    How per-object RAID with VSAN can lower your risk as your storage capacity grows
  • Prepare for Tomorrow's Apps: Containers and VMware vSAN Prepare for Tomorrow's Apps: Containers and VMware vSAN Michael Haag, Product Line Manager Storage and Availability VMware Recorded: Feb 10 2017 63 mins
    Technology is shifting faster than ever before with the emergence of new data center architectures, thanks to HCI, and new application architectures, thanks to cloud-native apps and containers. IT departments are faced with addressing immediate day-to-day challenges but also looking ahead to how they can embrace these emerging architectures. Luckily the virtualization revolution of the past decade means organizations are well positioned to evolve their current IT infrastructure to shift to HCI, which provides numerous advantages to cloud-native apps that have their own unique requirements that are important for IT teams to understand. VMware is focused on addressing these requirements as we continue to accelerate the evolution to HCI with vSAN. The hypervisor-integrated architecture of vSAN provides numerous benefits for cloud-native applications, whether deployed on own or as the underlying storage services to Photon Platform.

    Takeaways:
    **How HCI and new cloud-native applications are changing the approach to IT

    **What are the new requirements needed to successful run cloud-native apps and containers

    **How are HCI solutions powered by vSAN well suited to meet new requirements
  • Podcast - What is DRaaS? Podcast - What is DRaaS? Charlie Hodges, Storage Switzerland Recorded: Feb 9 2017 17 mins
    Disaster Recovery as a Service (DRaaS) is a recovery option that is getting a lot of attention right now. In this live podcast, Storage Switzerland and Carbonite cover exactly what DRaaS is and whether or not your organization should consider it? Join us as we cover all things DRaaS. We’ll even answer all your DRaaS related questions.
  • Strengthening your app monetization super powers Strengthening your app monetization super powers Stewart Rogers, Director of Technology, VentureBeat Recorded: Feb 9 2017 60 mins
    It takes more than Superman or his Justice League to develop and maintain an effective app monetization strategy. This is especially true in light of a recent report which found that 0.19 percent of all mobile game players contributed 48 percent of revenue. How can one identify the high-spend users while not alienating the remaining percentage that only have potential to spend within the app?

    Ideally, one would customize app strategy according to type of user. Better still, each user would have her own strategy. Unfortunately this isn't a scalable solution to monetization.

    In this webinar, you'll learn to:

    * Customize your monetization strategy so that it's scalable
    * Unlock the revenue potential of lower spending users
    * Attract higher-spend users
    * Negotiate monetization strategies without alienating current users

    Speakers:
    * Maximo Cavazzani, founder and CEO, Etermax (Trivia Crack)
    * Eric Shashoua, CEO, Kiwi for Gmail
    * Stewart Rogers, Director of Technology, VentureBeat
    * Wendy Schuchart, Analyst, VentureBeat


    Register today for this free webinar.
  • Building an NFV Enabled SDWAN Solution with Intel & Happiest Minds Building an NFV Enabled SDWAN Solution with Intel & Happiest Minds Dharmraj Jhatakia, General Manager – DCT, PES and Purnendu Ghosh, Associate Architect- PES both with Happiest Minds Recorded: Feb 9 2017 40 mins
    This webinar will provide you with practical and technical insights that provide a holistic picture of the emergence of SD-WAN and showcase some of its most compelling use-cases. We will also touch upon how Happiest Minds has architected and implemented this solution on Intel platforms using DPDK on Intel Atom based CPE as well as Intel XEON based NFVI running various VNFs like Firewall, IPS, IDS, Antivirus et al. This SDWAN and CPE solution using DPDK and Intel chipsets provides unmatched flexibility that can help transform expensive and inflexible wide area networks to being cost effective, agile, intelligent and feature rich.
    The session will enable the audience to understand the various deployment topologies and the services that can be provisioned using NFV & SD-WAN and also discern the significant components which enable the entire solution to comply with SLAs similar to current deployments with physical network functions.
  • Lightboard Series: Micro-segmentation Planning – What You Need to Know Lightboard Series: Micro-segmentation Planning – What You Need to Know Sean O’Dell, Systems Engineer, Network & Security Business Unit, VMware Recorded: Feb 9 2017 21 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 1/3
    Title: Micro-segmentation Planning – What You Need to Know
    Abstract: Are you interested in deploying micro-segmentation but not sure where to start? One of the challenges is acquiring a complete picture of what’s going on within the datacenter and understanding your network flows. We’ll show you how to collect and analyze network flows in real time with vRealize Network Insight, providing vital context into the virtual machines and the applications they are originating from or terminating to. Once you understand who is talking to whom and which flows need to be allowed or blocked, you can use that intel to effectively model security groups and firewall rules, making micro-segmentation easier to deploy.

    In this webcast, we will discuss:
    •The key steps you need to know to prepare for micro-segmentation
    •How to collect network flow data to build a picture of your application environment
    •Using network flow information to model security groups and firewall rules
  • Making the Move to the Cloud with Horizon Air Making the Move to the Cloud with Horizon Air Joe Evans, Sr Product Marketing Manager, VMware Recorded: Feb 8 2017 44 mins
    In the past, every user had a single desktop. That’s all IT had to worry about – how to manage that single desktop. But now, end-users are more remote than ever and they have multiple devices, many of them non-Windows devices. IT has to manage all of those devices and keep the corporate network secure. VMware Horizon Air Cloud-hosted and Horizon Air Hybrid-mode are a great solution for organizations looking enabling this mobile workforce, but want a solution that enables them to drastically simplify management, while moving to an OPEX model. Join us in this session where we will showcase how Horizon Air can help you meet the needs of your end-users.
  • How to Leverage Application Monitoring for Enterprise Cloud Infrastructures How to Leverage Application Monitoring for Enterprise Cloud Infrastructures Bala Vaidhinathan, CTO of eG Innovations Tommy Gustaveson, Alliance Manager, Nutanix Feb 21 2017 6:00 pm UTC 60 mins
    With comprehensive end-to-end network monitoring and an industry-leading Enterprise Cloud Platform, learn how you can elevate IT making the hyper-converged infrastructure invisible and empower your organization to focus on what matters most – application performance.

    Together, Nutanix and eG Innovations offer a fully validated, hypervisor-agnostic platform designed to optimize the deployment, management, and scale of virtual desktop infrastructure environments. The goal? To avoid performance degradation and deliver the best user experience.

    In this webinar, you will discover how eG Innovations and Nutanix are collaborating to:

    - Make Citrix VDI more simple, cost-effective, and hypervisor-agnostic
    - Correlate application and virtualization performance to pinpoint and solve the root cause of performance problems
    - Deliver optimal VDI User Experience using enhanced monitoring and management for Citrix VDI deployments
    - Get insights to optimize and right-size your Nutanix infrastructure, avoid downtime and improve datacenter efficiency, invest wisely and reduce the cost and complexity of IT operations management
  • Detect Ransomware Before it’s Too Late with AlienVault USM Detect Ransomware Before it’s Too Late with AlienVault USM Jim Hansen Feb 21 2017 6:00 pm UTC 60 mins
    By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

    AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.

    You'll learn:

    How AlienVault USM detects communications with the command and control server
    How the behavior is correlated with other signs of trouble to alert you of the threat
    Immediate steps you need to take to stop the threat and limit the damage
  • Moving VMware from Disaster Recovery to High Availability Moving VMware from Disaster Recovery to High Availability George Crump, Storage Switzerland Feb 21 2017 6:00 pm UTC 60 mins
    VMware's stretch cluster does an excellent job of protecting against a site failure. If your primary data center fails then it is easy to bring up VMs in the second site. But what if you need more? How can you extend VMware's stretch cluster capability from single site protection to multiple sites? What if you want to extend recovery into the cloud? A multi-site and multi-cloud data distribution strategy not only creates more resilient IT operations, it also empowers workload mobility.

    In this live webinar Storage Switzerland and Hedvig will discuss the limitations of VMware stretch cluster, the possibilities of a more highly available approach and how to achieve complete IT resiliency.
  • Key Security Insights: Examining 2016 to predict what's coming in 2017 Key Security Insights: Examining 2016 to predict what's coming in 2017 Ken Dang Feb 21 2017 7:00 pm UTC 60 mins
    Cyber-crimes are alive and well on the global stage. Don’t resist taking the necessary defense measures to stop threats from slipping through the cracks. In this SonicWall Security Annual Threat webcast, we’ll present the most common attacks in 2016 and the ways we expect new threats to affect businesses throughout 2017.

    Some report highlights:
    •Ransomware changes in 2016 and the effects on malicious email and exploit kits
    •The growth and challenges of SSL
    •How Internet of Things devices were exploited and different security steps some organizations are taking in response
    •Developments in Android security
    •Changes in Point of Sale Malware compared to 2015 and useful lessons to be learned
  • Why Containers? Discover the Future of IT and Applications Why Containers? Discover the Future of IT and Applications Scott McCarty, Sr. Principal Product Marketing Manager, Red Hat Feb 21 2017 8:00 pm UTC 45 mins
    Containers disrupted the shipping world decades ago and are now prime to alter I.T. in both physical data centers and virtual environments. But, do you fully understand the business value promised by the emergence of container technology?

    Container strategies allow your applications to be easily and efficiently shared and deployed, from a centralized server that allows greater collaboration between groups. In this live webinar with Scott McCarty, Senior Principal Product Marketing Manager at Red Hat, you will learn details about the benefits containers can bring to your business including:

    - Can your problems be addressed using containers
    - Should you containerize your applications
    - How to manage all the containers
  • SUSE Container as a Service Platform - Grow your Technical knowledge SUSE Container as a Service Platform - Grow your Technical knowledge Rob Knight Feb 22 2017 3:00 pm UTC 30 mins
    Get some excellent technical details on Container as a Service in only 15 minutes!
  • Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Data Plane Development Kit (DPDK) 16.11 & 17.02 New Features Tim O’Driscoll, Product Marketing Manager for DPDK, Intel Feb 22 2017 4:00 pm UTC 45 mins
    This webinar will describe the new features introduced in the two most recent DPDK releases: 16.11 which was released in November 2016, and 17.02 which is due for release in February 2017.
  • DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value DevOps and the Mainframe: Your Partners in Velocity, Quality, and Value Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies Feb 22 2017 4:00 pm UTC 60 mins
    In the application economy where traditional business is being disrupted, velocity, agility, quality and customer experience is critical for enterprises to drive differentiation to remain competitive. While many believe that DevOps is only for startups and unicorns, forward-thinking organizations are focusing on unlocking the potential of their mainframe investments to drive their Business Technology culture, leveraging DevOps practices including agile development, automated CI/CD pipelines, testing and release automation, to deliver differentiated products and services.

    Join guest speaker Rob Stroud, Principal Analyst at Forrester, and Dana Boudreau, Senior Director of Product Management at CA Technologies, for an in-depth discussion on how bringing DevOps to the mainframe can challenge traditional development methodologies, delivering code faster with greater quality in responding to escalating market demands.
  • Is Your Storage Ready for Disaster? Is Your Storage Ready for Disaster? W. Curtis Preston with StorageSwiss, Lei Yang and Bill Roth with Tintri Feb 22 2017 6:00 pm UTC 60 mins
    The recovery expectations of users and organizations is changing and their tolerance for downtime is lower than ever. IT professionals can no longer rely on the traditional backup and recovery process to meet these new requirements. Primary storage needs to do more, and simple LUN-based replication is not going to get the job done. Instead data centers need to look for primary storage that has advanced replication capabilities and can integrate with multiple hypervisors and existing data protection solutions to create a holistic disaster recovery strategy.
  • Flexible, Real Time Visibility for SUSE OpenStack Cloud Flexible, Real Time Visibility for SUSE OpenStack Cloud Sanjay Mishra - Talligent, Frank Rego - SUSE Feb 22 2017 6:00 pm UTC 45 mins
    As cloud use continues its rapid rise, businesses need to have the power, clarity, and control to realize their cloud capacity and cost goals. Simplify the tasks of planning, tenant onboarding, show-back and chargeback, and predicting capacity requirements for SUSE OpenStack Cloud with Talligent’s Openbook solutions. Openbook is certified to run in a SUSE OpenStack Cloud environment, and supports SUSE Linux Enterprise Server running in Amazon Web Services, Microsoft Azure and Google Compute Engine.
  • Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Tech Talk: Application Prioritization & Compliance With Business Intent Overlays Derek Granath and Adam Fuoss Feb 22 2017 7:00 pm UTC 60 mins
    Implementing business intent overlays streamlines the process of delivering applications with the priority and QoS that business demands. Business intent overlays extend micro-segmentation from the data center across the WAN to help organizations maintain compliance requirements. Learn how to make this manageable with a Silver Peak’s SD-WAN.
  • Moving on with Salt and SUSE Manager Moving on with Salt and SUSE Manager Donald Vosburg Feb 23 2017 3:00 pm UTC 30 mins
    When was the last time you looked at SUSE Manager? Are you running an older version? Are you running Satellite 5.X or Spacewalk?

    SUSE Manager has powerful capabilities that you may not know about, especially as SaltStack integration progresses.

    In this webinar we will highlight some of the great integrations that has already been done. Then, our focus will turn to getting there from where you are: migrating from existing SUSE Manager, Satellite, or spacewalk. We will show how to migrate your server to SUSE Manager, and clients to SaltStack minions with practical tips.
  • The 5 Essentials of Unified Endpoint Management for Windows 10 The 5 Essentials of Unified Endpoint Management for Windows 10 Jason Roszak, Director, Product Management, VMware Feb 23 2017 4:00 pm UTC 60 mins
    Keep your endpoint devices, apps and data securely managed on or off the domain. With VMware unified endpoint management, you’ll remediate vulnerabilities faster, deploy patches instantly and install Win32 software quickly, reliably and consistently.
    Topics include:
    •Consolidate Windows management across devices on or off the domain
    •Deliver and install Win32 software reliably and quickly
    •Deploy security patches instantly and remediate vulnerabilities faster
    •Unify endpoint management functions across desktops and mobile devices
    •Find out how other organizations are using unified endpoint management for Windows 10
  • Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery Lightboard Series: NSX for Multi-site Deployments and Disaster Recovery John Whitman, Senior NSX Systems Engineer, VMware Feb 23 2017 4:00 pm UTC 15 mins
    Series Title: Illustrating the Value of Network Virtualization
    Series Abstract: Join VMware NSX experts for a series of short webcasts focused on the technology and business drivers around network virtualization. Using a lightboard, we’ll illustrate how network virtualization with NSX can support an organization’s strategic initiatives.

    Webcast 3/3
    Title: NSX for Multi-site Deployments and Disaster Recovery
    Abstract: Deploying NSX across multiple datacenters allows organizations to dynamically move and manage workloads between multiple physical locations. The benefits of this capability are immediately clear: workload mobility, resource pooling, central management, consistent security policies across vCenter domains/sites, and disaster recovery. In this session, we’ll illustrate use cases and capabilities, including L2 connectivity without the use of OTV, cross-data center security policies, and isolating networks for disaster recovery testing and validation. In the second part of the session, we’ll dive into how NSX can improve your business disaster recovery plan and strengthen your overall RTO.

    In this session, we will discuss:
    •The many benefits of deploying NSX across multiple data centers
    •Capabilities and use cases for cross-data center connectivity and security
    •Using NSX to improve your disaster recovery plans and strengthen RTO
  • PKI - Your Ally in the War Against Security Threats PKI - Your Ally in the War Against Security Threats Rae Barton, Enterprise PKI Expert at Gemalto Feb 23 2017 5:00 pm UTC 60 mins
    PKI used to be difficult to implement, and was seen as complex, labor intensive and expensive. The development of powerful credential management software has brought considerable improvements. It now does much of the manual work that used to be left up to the administrators saving them valuable time in the war against security threats. In our last webinar, we found almost 50% of those you voted cited the Internet of Things as the main driver for PKI. More connected devices and users will create a need for higher levels of security in all organizations as the number of possible threats and attacks increase.

    For security professionals, implementing and modernizing their PKI systems will be crucial, keeping in mind not all PKI implementations are created equal. Some are inherently more complex, depending on the level and layers of security needed for within your organization. Following our previous PKI foundational webinar, this one will cover the elements you need to consider when designing a PKI environment.

    Join us for the “PKI – Your Ally in the War Against Security Threats” to learn how you can maximize your organization’s security and the things you need to know to get started including:

    •PKI use cases in an enterprise environment to secure access and protect data
    •Budgeting for your PKI deployment of modernization
    •Outlining the deployment size, scope and timeline
    •Analyzing and reviewing current and/or future security policies
    •Maintenance and administration of the PKI system
    •Configuring and understanding certificate authorities
    •Developing a scalable approach to prepare for future needs
    •Addressing the protection of sensitive keys and the ecosystem integration
  • DataON™ MUST™ Provides Infrastructure Visibility and Management for your Windows DataON™ MUST™ Provides Infrastructure Visibility and Management for your Windows Howard Lo, DataON Storage; Cosmos Darwin, Microsoft; Peter Plamondon, Western Digital Feb 23 2017 6:00 pm UTC 60 mins
    With the launch of Window Server 2016, new storage enhancements bring revolutionary new features within reach of every organization with its software-defined feature setup. With Microsoft Storage Spaces Direct (S2D) and using Microsoft certified and turnkey platforms, customers now have the ability to deploy highly available and scalable software-defined storage deploy converged or hyper-converged cluster storage architecture. DataON’s new MUST infrastructure visibility and management tool provides SAN-like storage monitoring features for customers deploying Windows Server 2016 SDS. The ability to easily view real-time dashboard level metrics for IOPS, latency, throughput on cluster, nodes and volume levels in a single pane of glass, helping you keep your hyper-converged system up and running.

    Join speakers from DataON, Microsoft and Western Digital as they show you how to deploy a Windows Server 2016 S2D hyper-converged solution with DataON MUST.

    The webcast will explore the following topics:

    • How DataON MUST visibility and monitoring tool helps you manage your Windows Server 2016 software-defined storage

    • How Storage Spaces Direct in Windows Server 2016 allows you to build software-defined storage using Microsoft-certified industry-standard servers with local storage

    • How Western Digital storage solutions support Windows Server 2016

    Presented by:
    Howard Lo, VP of Sales and Marketing, DataON Storage
    Cosmos Darwin, Program Manager II, Microsoft
    Peter Plamondon, Director, Strategic Partner Ecosystems (Microsoft), Western Digital
  • DRaaS Best Practices - 5 Critical Recovery Steps DRaaS Best Practices - 5 Critical Recovery Steps George Crump, Storage Switzerland Feb 23 2017 6:00 pm UTC 60 mins
    Disaster Recovery as a Service (DRaaS) offers organizations one of the most viable recovery options available to them in recent years. The ability to have an on-demand recovery site that is pre-seeded with your data should dramatically lower costs and improve recovery times, even in the worst of disasters. But IT professionals can't take for granted that DRaaS providers will continue to cover data protection basics while also providing a seamless recovery experience. In this webinar, join Storage Switzerland Lead Analyst George Crump and Carbonite Senior Solutions Engineer Jason Earley as they provide you with the 5 Critical Recovery Steps for using DRaaS.
  • Reduce the Complexity of OpenStack Neutron Reduce the Complexity of OpenStack Neutron Charlie Gutierrez - Midokura, Frank Rego - SUSE Feb 23 2017 6:00 pm UTC 45 mins
    Midokura’s award-winning Midokura Enterprise Management (MEM) technology provides a software layer directly within existing physical network hardware, turning physical machines into a virtual platform that can scale to hundreds of thousands of virtual ports. The MidoNet integration with SUSE OpenStack Cloud provides an integrated solution for rapid OpenStack deployment. Now, customers can enjoy the very best possible deployment experience with leading technology from Midokura and SUSE, built to scale right out of the box.
  • How safe are your email-based communications? How safe are your email-based communications? Gus Maldonado Feb 23 2017 7:00 pm UTC 45 mins
    Email-based communications are a fundamental cornerstone for effectively conducting business. For that reason, however, email continues to be a popular vector for business sabotage. Email is frequently used to propagate malware – including ransomware and zero-day threats - across your network.

    This webinar examines how SonicWall Email Security – now integrated with Capture Advanced Threat Protection – delivers cloud-based, multi-engine sandbox protection for your email.
    Learn how this comprehensive, flexible and scalable solution can:

    •Scan a broad range of email attachment types to detect advanced threats
    •Analyze them in a multi-engine sandbox
    •Block them prior to a security verdict
    •Rapidly deploy remediation signatures
  • Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Don't Compromise your Network: How to Safely Run an Open Source Infrastructure Mandy Sadowski and Rich Jerrido, Technical Product Marketing Managers, Red Hat Feb 23 2017 8:00 pm UTC 60 mins
    The foundation of any IT deployment should be a sound infrastructure and standard lifecycle processes and procedures. At the forefront of every IT department this year is how to increase security, improve efficiency, and maintain compliance in an open source environment. With the ever-increasing influx of data, cloud and DevOps comes increased risk for cyber security attacks and data breaches. How can you continue down the path of digital transformation without compromising your network?

    Join this webinar to learn more about these increasing demands, and how Red Hat Satellite is spearheading these advancements.
  • Do You Really Mean ‘I Need a SOC’? Do You Really Mean ‘I Need a SOC’? Andy Herrington, Head of Cyber Professional Services, Fujitsu Services UK Ltd, Adrian Davis, Managing Director, (ISC)² EMEA Feb 27 2017 12:00 pm UTC 60 mins
    Enterprises have generally responded to the security challenge, recognising that they cannot simply cross their fingers and hope to avoid a major cyber incident. Many have reached for the ‘big security technology catalogue’ and in the past couple of years we have seen increasing numbers of organisations setting out with the intention of deploying some form of SOC. While there is no getting away from the fact effectively deployed technologies and the integration of a well organised SOC can be part of the solution, very few organisations can actually set up and operate a form of SOC that will make a material difference. In this webinar, experts from Fujitsu will discuss the considerations that go into an effective SOC, identify common mistakes and recommend a SOC Strategy which is more likely to yield an improved security posture than blowing a massive budget on a ‘home-grown’ SOC.
  • Facing up to Mobile Security Challenges Facing up to Mobile Security Challenges Stephen McCormack, Mobile Security Leader, IBM MaaS360, Adrian Davis, Managing Director, (ISC)² EMEA Feb 28 2017 12:00 pm UTC 60 mins
    Whether it is iOS, Android or Windows Phone, you can enable employees to be more productive and work flexibly on the go by supporting the smartphones, tablets and business applications they use on a daily basis. But what about the risks? Join me, Stephen McCormack from IBM MaaS360 as I take you step-by-step through the key challenges that mobile devices bring, and how you can easily act to ensure your organisation is protected.
  • Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Learn How SaaS-Managed Kubernetes Takes Containers to the Next Level Bich Le, Co-founder and Chief Architect, Platform9 Feb 28 2017 6:00 pm UTC 45 mins
    Container technology is hot and evolving every day by leaps and bounds. Just why are containers so attractive and how are they different from VMs? To add to the confusion, complex container environments need orchestration solutions, such as Kubernetes, to be managed effectively. There are a few different ways to deploy these solutions, each with their own drawbacks and benefits. In this BrightTALK session, we'll take a look at containers, container orchestration, and walk through a real-world application that shows why containers are leading the way.
  • Key Considerations for Migrating Graphics Workloads to the Cloud Key Considerations for Migrating Graphics Workloads to the Cloud Alex Herrera, Sr. Analyst, Jon Peddie Research & Ziad Lammam, Teradici Feb 28 2017 6:00 pm UTC 45 mins
    Moving to “The Cloud” is becoming a norm these days as it now provides better security and flexibility that enterprises are looking for in today’s ever growing “Big Data” landscape! Organizations with graphics workloads and interactive applications are looking for ways to consolidate their workstations to decrease CapEx and OpEx while ensuring data security for a disperse and mobile workforce.

    Alex Herrera, a senior analyst with Jon Peddie Research, author, and consultant to the world’s leading computer graphics and semiconductor companies will talk about on how enterprises can collocate their graphics intensive applications and workstations in the cloud to increase productivity and enhance collaborative working environment for creative professionals and design engineers in various verticals like: Media & Entertainment, Automotive & Manufacturing, Architecture, Engineering, Construction.

    This webinar will introduce key considerations in moving high-performance workstation to the cloud and provide valuable insights including:

    • Physical workstations vs. virtual workstations in the cloud
    • Choosing among cloud workstations - Private, Public or Hybrid
    • What to consider when moving to the cloud

    Teradici’s CTO Randy Groves will share how Cloud Access Software and PCoIP technology can enable you to securely migrate graphics intensive workloads and applications to the cloud while providing a seamless and “workstation-like” end user experience.

    Those who attend the webinar will receive a copy of the slide deck.

    Q&A will follow at the end of the session.