Tom Foremski with featured speakers from the Virtualization Summit
Silicon Valley Watcher editor Tom Foremski moderates a panel of featured speakers from BrightTALK's Virtualization Summit as they respond to questions and engage in a lively discussion of the ins and outs of virtualization.
Now, corporations truly understand that it’s not a matter of if a disaster will occur, but when. Hurricane Katrina is one example of a major disaster that has forced companies to pause and reevaluate their Disaster Recovery strategy. Virtualization technologies have created an affordable DR approach, yielding greater environment flexibility and mobility. However, many manual steps must still be taken to recover or failover an entire IT environment. VMware’s Site Recovery Manager (SRM) can automate most of those manual steps to provide a repeatable, reportable and recoverable solution to complement your corporate DR plan. This presentation will focus on the benefits of SRM and key points of consideration when looking to automate your DR steps.
While the cost, flexibility and scalability benefits of virtualization are undeniable, so are the systems and network management challenges created by the virtual data center. Cautionary tales abound, examples of organizations who have not just figured out how to manage their virtualized environments, but how to use management to maximize their performance and availability are still fewer than one would expect. In this Webcast, Javier Soltero, CEO of Hyperic will address best practices for managing and monitoring your virtualized data center, once created. He will also provide expert input on how to evaluate virtualization management tools, tricks for streamlining application-level management, common misperceptions and pitfalls that can be avoided and much more. Last he will offer clear cut examples of companies that have successfully overcome virtualization management hurdles.
Any IT transformation is complex and high risk, requiring significant change in technology, process and culture. This is why an incremental, plan-driven approach is critical for successful transformation. The Cloud Computing Adoption Model is a graduated, stepwise approach for adoption of cloud technologies. It helps to cut through the hype and lay out a clear game plan incrementing toward cloud without putting projects, budgets and even careers at risk based on a 5-step framework loosely modeled after the Capability Maturity Model (CMM) from the Software Engineering Institute (SEI) at Carnegie Mellon University. For each level, the Model outlines the strategic goals, key investment requirements, expected returns, risk factors, and readiness criteria for graduating to the next step.
Today, companies are increasingly looking into HCI solutions as server virtualization becomes pervasive, the cost of server-side flash drops, and demand increases for operational efficiency without silos.
Join us to learn about HCI trends and VMware hyper-converged software. We’ll discuss how your environment can benefit, and how you can build a simple, efficient and very cost-effective hyper-converged infrastructure—without starting from scratch.
Companies used to know where their data was at all times: It was in the data center, surrounded by physical walls. But today, your data is everywhere your employees and customers are — on phones, on tablets, on laptops, in the cloud. Anywhere, anytime access provides more work-life balance and helps employees stay productive, but it also puts data security at considerable risk. The challenge companies consequently face is how to provide fast, simple access to enterprise applications, data and resources without compromising security.
Join Mark Hewett, senior product manager for Dell SonicWALL Secure Mobile Access, and Steven Sanderson, senior product marketing manager for Dell SonicWALL Secure Mobile Access, for a webcast on how to manage and provision mobile devices to protect company data and networks from cyber attacks, viruses, malware and other threats.
•Ensure that only authorized users have access to appropriate data and through approved devices
•Quickly and easily provision secure mobile access and role-based privileges
•Keep company data secure in-flight and at-rest on devices
Enterprises are widely adopting hyperconverged infrastructure to transform the way they deliver IT services. At the same time, with dropping prices and increasing storage density, we’ve reached an inflection point that is transforming decisions around all flash deployments as well. If HCI is the path to the future, shouldn’t your storage decisions reflect that? With emerging technologies such as NVMe and 3D CrossPoint rapidly coming into the market, this session will dig into the new realities for enterprise datacenters and what could possibly be the ideal way to deploy flash.
The DPDK 16.07 release is due to be completed in July and will be available for download from http://dpdk.org. This webinar describes the new features that will be included in this release, including major changes such as:
Virtio in Containers
Cryptodev enhancements (software implementation of KASUMI algorithm, bit-level support for SNOW 3G algorithm).
Live Migration for SRIOV
Packet Capture Framework
External Mempool Manager
High Availability doesn’t trump Disaster Recovery and there is nothing simple about creating a recovery capability for your business – unless you have a set of data protection and business continuity services that can be applied intelligently to your workload, managed centrally, and tested non-disruptively. The good news is that developing such a capability, which traditionally required the challenge of selecting among multiple point product solutions then struggling to fit them into a coherent disaster prevention and recovery framework, just got a lot easier.
Join us and learn how DataCore’s Software-Defined and Hyper-Converged Storage platform provides the tools you need and a service management methodology you require to build a fully functional recovery strategy at a cost you can afford.
The industry was surprised when Dell announced its intent to acquire EMC for $67 billion, the largest tech deal ever. Merging two large stagnate companies with very different cultures and high-level of overlap in products can pose significant challenges.
Join this webinar to learn about:
- The acquisition implications and how it’ll affect your long-term storage investment
- The uncertainty on Dell and EMC’s roadmap and which products will continue to be invested in
-Alternate storage solutions that enable you to transform data into insights and value for your organization
ESET’s Sr. Security Researcher, Stephen Cobb, will analyze the current cybersecurity threats trending during the first half of 2016. We’re covering everything from ransomware to regulatory risks and mobile malware to IoT vulnerabilities. Learn about what trends are on the horizon and gain practical advice for managing these risks:
•PCI and two-factor authentication
•PUAs and scamware
•Privacy by design
•General Data Protection Regulation (GDPR)
With all the technology and process improvements over the past 20 years, and with almost every IT organization wanting to increase ITSM maturity, you would think that maturity levels would have increased; but that is not the case. This webcast will discuss how to increase ITSM maturity in eight different areas including user experience, process automation, and incident, problem, change, configuration, request and knowledge management, and more.